Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Considering Encryption in Light of Android Messages’ Update

Considering Encryption in Light of Android Messages’ Update

With the addition of end-to-end encryption to Google’s Android Messages application, we have a perfect opportunity to discuss the concept of encryption and why it is so important. Let’s dive right in, shall we?

First, let’s go over what encryption is, as a bit of background.

What is Encryption, and How Does it Work?

If you’re looking to keep data secure as you share it or store it, encryption is one of the best means to do so.

For instance, let’s say that (for whatever reason) we wanted to share a line from Romeo and Juliet with someone, but we wanted to make sure that the someone we’re sharing it with would be the only one to get that information. By using encryption, we can take the following passage...

“But, soft, what light through yonder window breaks?
It is the east, and Juliet is the sun.”

...and turn it into this as it is sent along:

OoLCYOGthzwihU03wMa6y1xdbXhK4bM+XQCE02c2LCV6qg2mdGPG4MWgPHOQzmkfUC2jxq2/sKE9eN4E+6ByUBGukTFnxL9ShM0oqIv3HAN7m8yXBOwyMa9B6Hn2FXYw

Once this information has been encrypted, only someone with the decryption key could take this jumble and restore it to William Shakespeare’s classic piece. Think of it like using the Ovaltine decoder ring from A Christmas Story

Obviously, this is a gross oversimplification of how encryption works. In reality, encryption is effectively an enormously complicated math problem that would take even the most powerful computer centuries to solve.

Okay, so now that we’ve established what encryption is, let’s dive into what Google has done with its Android Messages app.

Google is Adding Encryption to the Stock Message App on Android

First announced at the launch of its beta test in November of 2020, all up-to-date instances of the default Android Messages application now feature end-to-end encryption. This is certainly a welcome improvement, as SMS messages are often used to transmit sensitive information and two-factor authentication proofs.

As of right now, this encryption feature comes into play with one-on-one chats between users who have chat features enabled on their device, and is visually represented by a padlock at the top of the screen.

Encryption is a Tool That You Should Be Using

While encryption alone won’t be enough to completely protect your business’ processes as a whole, that isn’t to say that it can be skipped—quite the opposite.

Total Tech Care can assist you in implementing this and various other security measures and protocols. To learn more about what we have to offer, give us a call at 866-348-2602.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 18 May 2024
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Network Security Business Google Microsoft Internet Email Malware Backup Workplace Tips Innovation User Tips Data Computer Mobile Devices Hardware IT Services Disaster Recovery Android VoIP communications IT Support Communication Business Continuity Smartphones Miscellaneous Smartphone Mobile Device Browser Small Business Network Collaboration Productivity Cybersecurity Quick Tips Users Business Management Managed IT Services Windows Upgrade Phishing Data Backup Outsourced IT Ransomware Windows 10 Data Recovery Office Server Save Money Cloud Computing Passwords Windows 10 Virtualization Social Media Saving Money Holiday Tech Term Gadgets Chrome Automation Managed Service Managed IT Services Microsoft Office Facebook Computers Cybercrime Operating System Artificial Intelligence BYOD Mobile Device Management Health Networking IT Support Internet of Things Hacking Wi-Fi Telephone Systems Information Technology Information Remote Spam Managed Service Provider Covid-19 Alert Office 365 Recovery Employer-Employee Relationship Router Bandwidth BDR Social Engineering Mobility Password App Money History Mobile Computing Data Breach Encryption Applications Application Human Resources Law Enforcement Remote Monitoring Big Data Blockchain Apps Office Tips Training Paperless Office VPN Government Remote Computing How To Private Cloud Mobile Office Managed IT Data Storage Patch Management Vulnerability Work/Life Balance Flexibility Windows 7 Wireless Word Marketing WiFi IT solutions Servers Gmail Entertainment Website Budget Settings Google Drive Infrastructure Voice over Internet Protocol Data Security Two-factor Authentication Avoiding Downtime Mouse HaaS Bring Your Own Device Data Management Risk Management Cleaning RMM Hacker Scam The Internet of Things Telephone System Staff Software as a Service End of Support Lithium-ion battery Machine Learning Education Physical Security Vendor Management Connectivity Remote Work Safety HIPAA Sports USB Firewall Redundancy Keyboard Virtual Reality Apple Social Vendor Data Protection User Error Managed Services Display Save Time Meetings Employee/Employer Relationship Conferencing Computing Infrastructure Biometrics Access Control Unified Threat Management Business Intelligence Virtual Desktop Going Green Virtual Assistant Computer Accessories Computing Audit Worker Authentication DDoS IT Management Battery SharePoint Shadow IT Botnet IT Plan Legal Digital Signage Printer Update Internet Exlporer Bluetooth Unsupported Software Customer Service Environment Google Docs PDF Charger Identity Theft Fax Server Procurement Net Neutrality Compliance Workplace Strategy OneNote Computer Care Proactive IT IT Consultant SaaS Current Events Help Desk Augmented Reality Best Practice Telephony Printing Samsung YouTube Humor Fraud Black Market Remote Worker Network Congestion eWaste Managed Services Provider Value Cryptocurrency Spam Blocking Database Electronic Medical Records Document Management Solid State Drive Wireless Technology How to Remote Workers Downtime Hiring/Firing Comparison Wearable Technology Processor CES Retail Data storage Hard Drives Instant Messaging Automobile Robot Hard Drive Excel Business Technology Content Management Virus Windows Media Player Copiers 5G Printers User PowerPoint Millennials Tools Wireless Charging Quick Tip Television Smart Office Smartwatch Streaming Media Ergonomics Reputation Development OLED Virtual Private Network Tech Support Managing Stress Workforce Content Cables PCI DSS Techology Virtual Machine Public Computer Laptop Science Employee Transportation Cameras 2FA Regulations Fiber Optics Customers Messaging Computer Fan Cabling Project Management Rootkit Nanotechnology Telecommuting Audiobook Cortana Distributed Denial of Service Policy Customer Relationship Management Hypervisor Touchpad Analyitcs Benefits Digital Signature Dark mode Trend Micro Workers SMS FENG Advertising Programming Default App Warranty Politics Google Apps Procedure Saving Time IBM HVAC Google Search Smart Technology Notifications Analysis Printer Server dark theme Flash Shopping Antivirus AI IT Infrastructure Administrator Devices FinTech Software Tips Supercomputer Windows 8 Bing Enterprise Content Management Relocation MSP Accountants Sync IT service Social Network Emails Investment Microchip Thought Leadership Credit Cards Password Manager Employees Video Games Employee/Employer Relationships Tablet Password Management Netflix ISP Two Factor Authentication Windows 365 Multi-Factor Security Worker Commute Domains Experience Video Conferencing Root Cause Analysis ROI Search Engine Twitter Music Business Mangement IaaS Sales HBO Scalability Maintenance Bitcoin Knowledge Shortcuts NIST Bloatware Cryptomining Smart Tech Point of Sale Trending Skype Business Owner Personal Supply Chain Management Data loss NarrowBand Addiction Amazon Troubleshooting Consultant Recycling Monitoring Outlook Search Batteries Leadership Tablets iPhone Entrepreneur Wiring Practices Analytics Windows 8.1 Start Menu Digitize Screen Mirroring Windows Server 2008 R2 Loyalty Cache Amazon Web Services Safe Mode Books Best Available Criminal Customer relationships Frequently Asked Questions Shortcut Windows 10s Files Cost Management Manufacturing GDPR WIndows 7 Hosted Computing Email Best Practices Mobile IT Assessment Online Shopping Cast Social Networking Chromecast Wireless Internet File Sharing Emergency Computer Tips Tip of the week Managed IT Service webinar Security Cameras OneDrive Public Cloud Colocation Biometric Security Camera Employer Employee Relationship Uninterrupted Power Supply Inventory Virtual CIO Specifications Professional Services Evernote Running Cable Peripheral Assessment Wire Digital Security Cameras Travel Windows Server 2008 Using Data Monitor Memory

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code